• Font Size:
  • S
  • M
  • L

Chapter Content

Title:

Reference Guidelines on the Cybersecurity Protection of Service Enterprises in Securities and Futures Markets  CH

Announced Date: 2024.04.19 (Articles 2, 3, 5, 7, 8, 12, 16 amended,English version coming soon)
Current English version amended on 2022.04.26 
Categories: Information Operations
   Chapter 2 Network Infrastructure and Cybersecurity Management
Article 4    (Definition of Network Infrastructure)
  1. A network infrastructure enables an organization to consider business maintenance and operation and information and communication security more comprehensively when the organization is devising its business operation system and structure.
  2. A network diagram shall indicate the equipment of the network environment essential to the maintenance of business operation, such as firewalls, routers, switches, system equipment, wiring, servers and services, wireless networks. Relevant files and records shall be available of proposed network segments and routing, host address, and backup cables.
Article 5    (Network Segmentation)
  1. Work areas shall be divided and isolated by network segmentation to ensure network infrastructure security.
  2. For the purpose of maintaining business operation, the network shall be segmented into, for example, Delimitarised Zone (DMZ), Production (Prod.), Unit Test (UT) or User Acceptance Test (UAT), and others.
  3. An organization shall define the extranet and intranet. The extranet is connected to the Internet, while the intranet is a server-equipped area between personnel and internal services of the organization. Traffic from the extranet to the intranet is subject to access control to avoid unsanctioned services.
  4. Segregation by a virtual local area network, or VLAN, is advised for intranet segments of an organization. The intranet may be segmented according to the internal units, departments, business natures, etc. of the organization, with restrictions imposed on access among different VLANs.
  5. An organization shall isolate services whose access is restricted and specific services by appropriate means. Information personnel shall, depending on the way of segregation, review the firewall rules or access control list (ACL) periodically.
Article 6    (Network Equipment Protection Standards)
  1. An organization shall avoid using end-of-service (EOS) or end-of-life (EOL) network equipment and devise replacement related plans with regard to such equipment.
  2. An organization shall check for official releases of updates to software, firmware, vulnerability remediation programs and, upon evaluation, update network equipment to the current version or the supplier proposed version.
  3. An organization shall implement identity verification when it performs remote maintenance of the system through connection by the Internet to the intranet.
  4. The protection standards applicable to all the network equipment of an organization are governed by the Reference Guidelines on the Protection of the Information and Communication Systems of Service Enterprises in Securities and Futures Markets.
Article 7    (Wireless Networks)
  1. Security protocols in force as have been publicly ratified and containing no vulnerability shall apply to the protection of access to wireless networks which an organization makes available to external/internal personnel.
  2. An organization shall formulate wireless network password rules to minimize the risk of cracking.
Article 8    (Access by External Equipment of the Intranet)
    If an organization permits external/internal personnel to use external equipment to access the intranet, it shall submit an application and inspect the security and authorization of the equipment and also restrict access.